Saturday, August 6, 2016

BUS 188: Chapter 12 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 12 Outline (2 page minimum)
Aggarwal

Chapter 12 Outline: Information Systems Development

            Though businesses processes, information systems, and applications often are a topic of confusion to many, but many people have to understand that there are key differences in each topic and that they all correlate to one another. By having the knowledge, it makes it easier to appreciate the ways processes, systems, and applications are fully developed and can help us become a team member on developmental projects. With businesses processes and information systems, there’s a certain system is follows. For example, business processes include preparing quotation, verifying availability, check customer credit, approve special terms, and finally process order. This is known as an application where it is a combination of hardware, software, and data components to accomplish a set of requirements. Every IS has at least one application because every IS includes a software components. All 3 (Business processes, IS, and applications) have different characteristics and components, the relationship of businesses processes to IS are many-to-many (one relates to another), and every IS has at least one application.

            Business Process management (or BPM) is use to create new businesses processes and to manage changes within existing processes. The only exception to this is start-ups because organizations already have processes. BPM is often used to manage the evolution of existing businesses processes from one version to an improved version. For BPMs, there is a business process management and a IS development. Business processes are a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. Each of the words mentioned all have a distinct definition. Role is a collection of activities. Resources are people and computer applications assigned to roles. Flow is either a control flow (directs order of activities) or a data flow (movement of data amongst activities and repositories. In a nutshell, roles are like titles and they all have a distinct system on how they manage things. Processed in all need management because they constantly evolve. Process quality can improve depending on efficiency (use of resources) and effectiveness (accomplishing strategy). The only way to change a process is if it needs tuning or if problems arise. However, if a process is going along smoothly, it doesn’t hurt to try and improve on it so it can be better. Another thing to take note is technology because, as I’ve said before, technology is evolving at an alarming rate.

            Technology is the second reason to manage processes. Any new technological advancement will change the processes’ activities in a very pivotal way. Take for example Apple Inc. They have made strides in innovation and improving upon their phones, tablets, and computers. Each year, new models are introduced as well as features, enhanced resolution, having the ability to multi-task, and so on. Technology is evolving so fast to the point where creative and unique individuals are making it convenient for everyone to use because we, as humans, are constantly evolving. A third reason to challenge business processes is a change in business fundamental. A change in market, product lines, supply chains, company policies, company organization, internationalization, and business environment could modify the business process entirely. The fundamentals are the staple mark for businesses and if any of those were to somehow change, then those need to be taken into consideration.

            The blueprints for any business process are the understanding of the current process and for designing new versions of that processes. When looking at a process, you always define it, determine its requirements, design components related to the process, implement it, and finally maintain it. To be able to perform a function, the process behind it has to be successfully built and maintained so it abides by business standards. The scope of the system/process is all dependent if it’s feasible, form a requirement, and it able to be maintained. When the process is efficient and effective, it then turns into a system that, with most businesses, also tends to evolve on a daily basis to become better.

            Regarding systems, a conversion is often used to convert business activity from old systems to new. There are 4 types of conversions: pilot, phased, parallel, and plunge. Pilot installation revolves around the organization implementing the entire system on a limited portion of the business. The phased installation revolved around the new system/business process installed in phases across the organization. Parallel installation is the new system/business process that runs parallel with the old until a new system is test and becomes operational. Lastly, plunge installation is where the organization shuts off the old system and begins a new old. Structure is the key in any system and when the process/system is able to retain its structure, then its convenient for companies to evolve/improve upon it because structures change. Processes, systems, and structures will continue to evolve so long as there’s room for improvement on the part of the organization/business/company.


BUS 188: Chapter 11 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 11 Outline (2 page minimum)
Aggarwal

Chapter 11 Outline: Information Systems Management

            In the previous chapter, we talked about how IS security is important to consider and how we can respond. However, we will be talking about the functions and organization behind the Information Systems Department. The major functions of IS systems department include: Plan the use of IS to accomplish organizational goals and strategies, manage outsourcing relationships, protect information assets, develop, operate, and maintain the organization’s computing infrastructure, and finally develop, operate, and maintain applications.

            The Chief Information Officer (or CIO) is the title for the IS Department head. Some of the other titles he/she has are vice president of information services, director of information services, and director of computer services.  The CIO always reports to the CEO while sometimes-executive reports are sent to the Chief operating officer (or COO). The CIO’s IS department is in charge of technology, operations, development, and outsourcing relations. Operations department manages the computing infrastructure that includes computers, in-house server farms, network, and communications media. The development department manages the processes of creating new IS as well maintain the already existing ones. Lastly, the outsourcing relations IS department exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, and other services. Another function to take into consideration is the data administration that’s sole duty is to protect data and information assets by establish data standards and data management practices and policies. This shows how in-depth the IS department and how they function in every field.

            There are a variety of IS-related jobs that are both interesting and paid well. Some of these jobs include (but not limited to): Business analysts, systems analyst, programmers, test QQ engineers, technical writers, tech support engineers, network administrator, IT consults, technical sales, IT Project manager, IT manager, database administrator, business intelligence analyst, CTOs, CIOs, and CISOs. The amount of responsibility is different for each field, but all serve a purpose with different criteria, tasks, and salary ranges. To get up to CTO, CIO, and CISO positions, workers would have to work their way up, adapt to situations/scenarios, and have a very deep and in-depth knowledge on security threats, protections, and trends.

            Outsourcing the process of hiring another organization to perform a service. This is often done to save costs, gain expertise, and to free management time. Organizations and companies often chose to outsource portions of there IS system activities. For management as said above, outsourcing is used to obtain expertise, avoid managerial problems, and free management time. For cost reduction, outsourcing can be used to obtain part-time services as well as gain economies of scale. Lastly for risk reduction, outsourcing can be used to cap financial exposure, improve equality, and reduce implementation risk. Businesses and organizations have found hundreds of ways to outsource information services and portions of information systems. Some businesses choose to outsource the acquisitions and operation of computer hardware, the development of software, and even outsource an entire system. PeopleSoft, for example, gained popularity by providing payroll function as an outsourced service.

            Where there are advantages of outsourcing, there are also risks. Some of these include loss of control, benefits outweighed by long-term (or LT) costs, and they’re not being an easy exit. The loss of control include vendor in driver’s seat, technology direction, potential loss of intellectual capital, product enhancements in wrong priority, vendor management, direction or identity changes, and finally if the CIO is superfluous. Benefits outweighing by LT costs include having a higher unit costs forever, paying for someone else’s mismanagement, outsource vendor is de facto sole source in time, and may not get what you pay for but you don’t know it. Lastly, the no easy exist include critical knowledge in minds of vendors, NOT employees and expensive and risky to change vendors. When choosing to outsource, it is quite a difficult decision because businesses are constantly thinking about ups and downs. The correct decision in outsourcing may not be clear, but only time and events will enable the company to make a decision in doing so.

            Lastly, when becoming a user of information systems, we have both rights and responsibilities with your relationship with the IS department. We have the right to computer hardware and programs, reliable network and internet connections, a secure computing environment, protection from viruses/worms/threats, contribute to requirements for new system features and functions, reliable systems development and maintenance, prompt attention to any problems or concerns, properly prioritize problem fixes and resolutions, and effective training. Our list of responsibilities includes: Learning basic computer skills, learn standard techniques and procedures for the applications we use, follow security and backup procedures, protecting your passwords, use computers and mobile devices according to employer’s computer-use policy, make no unauthorized hardware modifications, install only authorized programs, apply software patches and fixes when directed to do so, devote time to respond carefully to requests for requirements for new system features and functions, and avoid reporting trivial problems.


BUS 188: Chapter 10 Outline

Matthew Mercado
08/06/16
BUS 188 (11:00am-3:00pm)
Chapter 10 Outline (2 page minimum)
Aggarwal

Chapter 10 Outline: Information Systems Security 

            With everything nowadays being accessible via the Internet and Social Media, does this mean that the world is secure because of the openness or has become even more vulnerable than before? Security, unfortunately, has become a major issue as threats are common and there’s always a loss whenever there’s no protection guaranteed. Much like safes/vaults, it’s considered valuable and closed from the public, but eventually there’ll be those who like to sneak around and butt into other people’s business. That is why security measures have been made to safeguard whatever needs protection. Such targets like personal belongings, files, and even money are the main 3 that often is up for the taking for thieves. The important thing to do is to create a safeguard (like a wall) to prevent any sort of threat from becoming too big. This minimizes threats and creates a more secure place. A prime example is our debit/credit cards. Whenever we use them, it’s very paramount that you never give out the ID number to strangers. Without our knowledge, those strangers could have access to your cards and could buy anything without your consent. Hackers can crack codes, break through databases, or even access personal records – you do not want any of those to be jeopardized by any means.

            Security nowadays often is breached and comprised due to a variety of sources. One such source is us – humans. Whether its accidental by employees or nonemployees, mistakes do happen and sometimes it may be costly. This is due to poor exercise of judgment, misunderstood direction on applications, and or even physical accidents. For example, a physical threat is if a construction worker were to accidentally drive a forklift into a wall. Not only is his life in danger, but the expenses for the damage forklift and property would always be threatening as well. Mistakes are common amongst everyone, but there are times when those errors, accidents, and misfires that often lead to disastrous results. Another example of a security breach that is common is bank robberies. Armed robbers carrying their weapons endanger the lives of the people as well as take advantage of people’s money, trust, and above all else – security. Even being at an ATM has become scary that security guards are often placed outside the facility in case a theft were to happen. Whether its theft, hacking, hijacking, or usurping power – our security has to improve or else attacks can be just about anywhere without there being someone to stop it.

            A very serious security breach also is a person impersonating someone else in order to gain data maliciously. Credit Card theft is a example of someone using your card without your consensus and ends up purchasing items that could accumulate to debt. Thankfully, there are ways to cancel your card in case something like happens, but what if pretexting takes place? When pretending to be someone else, everyone is under the assumption that everything is going well, but in reality that person is acquiring data that he/she can use to endanger lives and blackmail. Terms like spoofing, sniffling, and phishing are common when impersonating someone or even a company in order to access data in more ways that anyone can even imagine. Say, for example, I was receiving spam from companies that want to acquire my assistances or saying that I owe them money…that is an example of pretexting. When people give into these, its easy to manipulate people into thinking that they’re in the wrong. With technology advancing every year, accessing data is the norm and that’s why people have to be very careful while on the Internet. We have to be weary that anything can happen and in doing so, changing passwords, changing usernames, and hacking backup info is enough to take countermeasures just in case.

            Even with the progression of technology, threats can be stopped. As long as there are safeguards, then bypassing them could prove to be problematic for the attacker. The tighter the safeguard, the harder it’ll be for others. When implementing safeguards, another thing to note is that they are quite expense to create and maintain. Safeguards often reduce work efficiency and make daily tasks difficult to complete. The overall objective of information security is to find a trade-off between the risk of loss and cost of safeguard implementation. In other words, you want to make sure the risks outweigh the costs. For example, web-based attacks, malicious codes, and denial of services are just a few computer crimes that breach safeguards. There’s a lot of stress and irritation when it comes to our data being accessed because it just comes to show how easy it is to have info on the Internet be jeopardized due to safeguards being torn down. There are ways to respond to these security threats and in doing so, can keep us a little safe from harm.

            As said previously above, some ways to tighten security are to do the following: Take security seriously, create stronger passwords, use multiple passwords, send no valuable data by email or IM, use https at trust vendors, remove high-valuable assets from computers, clear browsing history (these include files and cookies), regularly update antivirus software, demonstrate security concern to fellow workers, follow organizational security directives and guidelines, and lastly consider security for all business initiatives. In just following these measures, we are enduring that information security is secured and we are taking the initiative to respond when anything happens            

Monday, August 1, 2016

BUS 188: Chapter 9 Outline

Matthew Mercado
08/01/16
BUS 188 (11:00am-3:00pm)
Chapter 9 Outline (2 page minimum)
Aggarwal

Chapter 9 Outline: Business Intelligence Systems

            Businesses always have a system that oversees patterns, relationships, and trends. These patterns, relationships, and trends are referred to as Business Intelligence (or BI for short). BI has the same 5 components as IS: Hardware, Software, Procedures, and People. All of this relates back to the concept of BI systems – information systems that process operational, social, and other data to analyze patterns. The BI intelligence application relates to four components: Operational DBS, Social Data, Purchased Data, and Employee Knowledge. The BI application then converts to Knowledge workers. The analyzing of data means to report, data mine, BigData, and have knowledge management. Businesses and organizations have generate so much data nowadays that, for the most part, BI is often used to inform. Referring back to SM in the previous chapter, BI can be used to access the patterns of certain trends and interests amongst a large majority on all SM platforms. Facebook is a prime example where it can identify trends much like a newsfeed, it’s the most-talked about topic or even the most read because it relates to an even broader audience than just one.

            With BI applications, one component is to identify purchasing patterns. When overlooking, for example, retail always look at their inventory and sees the buying behaviors of their customers. They look for style, feel, and appeal. If its Summer time, there’ll be less purchases for winter clothes and usually, winter attire is put on sale. Businesses and organizations have to be able to perceive patterns in order to make profit, conduct business, and retain customer loyalty. They can’t be two steps behind nor can be two steps ahead – they have to be able to be right along with the customer. Another example is when I used to work in retail and I sold leather jackets. There was a period of time where nobody would buy any leather products because it was out of season. Those who’d come buy to purchase one were only doing so for businesses purchases or were out of town. It was up to me to convince them of its usage as well as demonstrate the style, feel, and appeal of the jacket even if they didn’t necessarily have to buy it at that moment. That’s why retail is a prime example of businesses overseeing patterns. They keep up with the times and adaptable to change when need be. Another component BI could be used for is for Entertainment purposes.

            Streaming services such as Amazon, Netflix, Youtube, & Hulu could always be used to predict, perceive, and observe patterns in what shows they watch. A library of shows isn’t enough for everyone, so all the streaming services provide recommendations based on what the user has watched previously. For example, if I watched the show Breaking Bad on Netflix, Netflix would begin recommended shows that are like or similar to the feel of Breaking Bad. The service is predicting that we, the audience, will watch that show just because it has similar vibes to what we’ve previously watched. The observation and analyzing of patterns helps Netflix dictate what to provide for us as a means to attract a new audience to that show. These streaming services have changed the way we view TV because, nowadays, no one really rents videos or even buys movies. All of the content is available via the Internet and, much like a cassette tapes, we can rewind and fast-forward at our own leisure. People even go so far as to share Netflix accounts with others and, despite it technically not being legal, people have found a loophole in sharing content amongst one another as a means to create awareness of video streaming services’ popularity.

            Business Intelligence has three primary activities: Acquire data, perform analysis, and publish the results. A common example could be taking a test. When taking a M/C test, we utilize what we’ve learned from the material and apply it on the test. Once we submit it to the teacher/instructor, he/she will test the results, create the average of how well the class did on the test, and lastly publish the results to the individual with feedback. The first step is similar to data acquisition, which is the process of obtaining, cleaning, organizing, relating, and cataloging source data. When performing an analysis on the data, it’s pretty self-explanatory – they are observing the data to see any discrepancies (mistakes/errors) of any sort. Lastly, there are two types of publishing results: Push & Pull. Push publishing is the process of delivering BI to the knowledge workers who may need it. Pull publishing is the process that requires the user to request BI results. Publication of any media can include print or online content via web servers. Another prime example is SJSU’s Canvas – assignments, lecture slides, and test results can be posted online rather than given out by hand.

            Data, which turns into information, now is accessible everywhere. From Metadata to Databases, the amount of resources pulled to picture all the data sources is limitless. BI has made it possible for businesses and organizations to oversee the data they’ve collected and observe patterns from the formatting to the assumptions and constraints. Knowledge is vast and is pooled form all sorts of sources. Facebook is a prime example of a SM giant that has collected an ocean of information. From the information they’ve collected, users create communities based on specific information (interests, hobbies, and likes) and Facebook can observe patterns based on those communities just from the information they collected. It shows how everyone is interconnected one way or another and how everything mends together to illustrate a system that has become the norm of today. 

BUS 188: Chapter 8 Outline

Matthew Mercado
08/01/16
BUS 188 (11:00am-3:00pm)
Chapter 8 Outline (2 page minimum)
Aggarwal

Chapter 8 Outline: Social Media Information Systems

            With social media being the norm of the day, it’s not unusual for it to progress or advance every year because of technology. Everything is electronic nowadays and is accessible via the Internet. Platforms such as Facebook, Instagram, and SnapChat have made trends possible and have made rapid changes in the way we communicate and perceive information whether its relevant or not. Accessibility is both a privilege and a danger because with so much information at the touch of our fingertips, there’s an issue of whether privacy has become the issue or it’s the openness of the web. The amount of users on social media has become so limitless to the point where it’s bringing it a lot of popularity across all platforms. The sharing of content ha allowed everyone around the world to communicate via interest, hobbies, and or similarities. For example, I can find people on Facebook who happen to have the same interest in TV shows, music, and videogames. There are even communities online dedicated to these interests that it’s accumulating a large number of members to communicate amongst another despite not having met. Even though it’s a community online, the communication of interest is a topic of discussion because we enjoy talking about that particular interest. This brings us to SMIS.

            Social Media Information systems (or SMIS) are the information system that supports the sharing of content amongst a network of users. As said above, Facebook, SnapChat, and Instagram are prime examples of social media platforms that a lot of users use to support the sharing of content via the Internet/application. SMIS has 3 objective units: Social media providers, users and communities. The Providers/Platforms include the ones I stated have created so much community that social relationships are growing and even the number of users exceeds that of a population of people. Users are the people – the ones behind the sharing of the content. About 73% of people using the Internet use Social Media and about 40% access Social Media (or SM for short) via mobile phones. Social media day to day is attracting more and more users, creating even larger communities, and building even more social relationships. To put into perspective the magnitude of Social Media, there are about 1,415 active users on Facebook and, to this day, continues to grow. Through Facebook, as said before, communities are created so as to communicate with others around the world. Mutual interests and familial/organizational ties are the ones that makeup a community.

            Much like Information Systems (or IS for short), SMIS is made up of the same components: hardware, software, data, procedures, and people (you). For all 5, there are social media providers (Facebook, Instagram, SnapChat, etc.) and Users and communities (You and your interests). Hardware for SM includes desktops, laptops, and mobile devices. Software includes the browsers to access the applications such as IOS, Android, and Windows. Most of the SM vendors use a database management system called NoSQI to process their data through traditional DBMS products as well. SM fits into two categories: Content and connections. Content data is data contributed by the users while Connection data is data about relationships. For example, Content Data includes content that Facebook users write on their walls, making comments, and just about anything you publish on the site. For Connection Data, the friends and family you have are included in your list of connection. If you think about really, all SM is about is the sharing of content and the creating of connections.

            Procedures in SM are often considered informal, constantly evolving, and oriented socially. The software of SM is often designed to be easy to use and learn. The concern of SM is privacy, which I said above, is a pretty big issue depending on how people use the information. The creation of content isn’t scare by any means and in fact, through its accessibility, there has to be some level of organization to ensure that the data gathered is maintained and accurate. If its not knowledge, its just facts and figures with no context. Lastly, the people have a profound influence on SM because without people, there’s nothing going for that platform. The amount of people is so high on all platforms that its very similar to filling up a stadium at a sports game...they need to be able to fill the room and more in order to profit. The people are important and to this day, nothing can be done without human intervention.

            Content is something we’ve always shared online. There are blogs, websites, and community pages that are solely dedicated to specific interests, fields, and hobbies. These are always up for discussion because that community is enthralled with the idea of giving their opinion and output on that interest. The usage of SM has created B2C relationships to market products and even now, manufacturers have begun to use SM to become leaders of specific industries, promote brand awareness, and generate new B2B lead to retailers. This only comes to show how far SM’s profound influence has had on businesses and organizations. Content sharing has become the norm and as such, connections are made on a daily basis amongst users. 

Friday, July 29, 2016

BUS 188: Chapter 7 Outline

Matthew Mercado
07/29/16
BUS 188 (11:00am-3:00pm)
Chapter 7 Outline (2 page minimum)
Aggarwal

Chapter 7 Outline

            In any activity we do, there’s always a certain process that goes into it. Whether its’ figuring out the best route to school, which workout regiment to do at the gym, or even how to start your day, there’s always a step by step process. That is the system we currently live in because without order, everything would be unbalanced and a mess. Our day-to-day activities are considered structured for the most part and always follow a guideline. However, say a chef is trying to open up a new restaurant, but can’t quite figure which location would best suit it. This is what’s called a dynamic process, its less formal, is flexible, and often requires strategy. Processes define us because it gives us a criterion to abide by so that everything goes smoothly. Referring back to figuring out the best route to school, drivers who are going the opposite way would be facing traffic and thus, they would try to find an alternate route/contingency plan to avoid it at all costs. From an organizational standpoint, processes are spread out into 3 levels: workgroup, enterprise, and inter-enterprise. Depending on how wide the scope, it could prove challenging because there’s a fine line between following that process and managing it in its entirety.

            Workgroups is defined as the fulfillment of a purpose or goal when working together in groups. There’s always a certain process that goes into working alongside others because, for one, there has to be a designated leader, roles are clearly defined, issues need to be addressed as a team, and above anything else the work is accomplished. Certain operations all play a role in the process. For example, a leader of a group/team paper can designate one or two people to work on one component while the other members can compile a list of resources used for that paper. The leader is in charge of instilling responsibility and order so that the goal can be accomplished correctly and efficiently. Any and all problems should always be solved and anything overlooked could prove to be problematic. There’s a variety of workgroups such as: Sales & Marketing, Operations, Manufacturing, Customer Service, Human Resources, and Accounting. Each of these workgroups follows a process that abides by a set of functions that need to allocated and distributed evenly amongst its members.

            Enterprises spread out over an organization into multiple departments. You could say Sony Corporation is an enterprise because it’s a business that has split itself into multiple subsidiaries. Everything that helps contribute from various sources is considered an enterprise. Enterprises have a large amount of members and as an enterprise, there’s a lot of consistency needed to be maintained to work together. 3 examples of enterprise information systems include CRM, ERP, and EAI. An example of an Enterprise would be a hospital. It’s a system of doctors, nurses, medics, personnel, and patients that work together and support one another. When performing surgeries, doctors and their assistants have to work together to ensure that there work is performed efficiently and effectively and if not, it could be fatal for the patient they’re working on. Much like a workgroup, the compilation of its members have to ensure that everyone is doing their group, the work isn’t unburdening, and all problems can be solved so long as there’s a solution.

            Inter-enterprises are split into two or more independent organizations. Not only is there members spanning 1000+, but the level of procedure is formalizes, problems have solution right away, there are multiple organizations, and is more tight (sturdy) that ever. An example could be the Army, Marines, & Navy – all work in conjunction with one another to preserve peace for all citizens, thwart any and all terrorist or inhumane attacks, and maintain the stability of what our country stands for as a whole. They are all separate organizations, but they work together for a common goal – the preservation and prosperity of our country’s wellbeing. It’s a very complex if you think about it, but it’s difficult to change that kind of system because of its formality – its structured to the point where it’s impossible to change. Regardless if it’s a workgroup, enterprise, or inter-enterprise, there are two things processes quality follows: efficiency and effectiveness.

            Efficiency is defined as ratio of process outputs to inputs while effectiveness is defined as a measure of how well a process achieves an organizational strategy. Quality is an important thing to take into consideration because even with a structure and resources to utilize, if both efficiency and effectiveness aren’t taken into account, then everything that went forth into the process would be in vain. To improve the process quality, there are three 3 things to take into account: Performing that activity, augmenting a human who is performing an activity, and controlling data quality and process flow. Performance is key to any process and like all performances, its evaluated, critiques, and observed to ensure that its 100%. An example of performing an activity is booking a flight – you have to be able to find the best deal, ensure that you print out the receipt, and are on time early way before departure. The augmentation of a human performing an activity is dependent on management. If the human cannot perform the activity correctly, they have to be augmented so that they’ll learn and do better on the job. Lastly, controlling data quality and process flow is based on the data being collected about the human and activity. Both have to be working on conjunction together so that the data is matching the process correctly. 

Saturday, July 23, 2016

BUS 188: Chapter 6 Outline

Matthew Mercado
07/23/16
BUS 188 (11:00am-3:00pm)
Chapter 6 Outline (2 page minimum)
Aggarwal

Chapter 6 Outline

            When working on group papers/presentations, groups usually try to find the time to work on each of their parts whenever they can. Prior to the introduction of Google Drive, they would have to interchange and edit parts so that the workload was above satisfactory, everyone contributed, and that the workload wasn’t lackluster. Life was made much easier with Google Drive, a file storage that is synced by Google that allowed people to work together on a paper/presentation at the same time. Peer edits can be made instantaneously and Google even incorporated a chat function that allowed people to converse online while doing peer editing. It made things a lot easier for group work and it allowed us to share information without there being any delay.

            This brings us to the term of Cloud, the elastic leasing of pooled computer resources over the Internet. Everything from music files to word documents were all stored in a specific location where it could be accessed. When we say elastic, it means that the computing resources leaded could increase or decrease dynamically. The amount of time it takes to edit a group paper by hand is much more time consuming that if the paper existed on the cloud and a group member could offer their inputs right away. Another thing to take note of is if the resources used on the Cloud are considered pooled because, for the most part, it is shared because organizations use the same physical hardware through virtualization. Everything that exists on the Cloud is shared and, much like a safe, is only accessible to the users. The Internet has become a tool for the future and you could say that Cloud is a provider, it pools in resources to help aid in the development of ideas via data. The services provided over the Internet have become such a powerful asset that there’s nothing you can’t learn just by accessing the Internet.

            Cloud has garnered much support from computer networks, a collection of computers that communicate with one another over transmission lines or wirelessly. There are 4 basic types of networks associated with the Cloud and these include: Personal Area Network (PAN), Local Area Network (LAN), Wide Area Network (WAN), and the Internet and Internets. PAN is a group of devices connected around a single person. LAN is a group of computers connected at a single physical site. WAN are computers connected between two or more separated sites. Lastly, the Internet and the Internets is a network of networks. The main distinction between LANs and WANs is that LAN can place communication lines wherever because all lines reside on its premises whereas WAN contracts with a communication vendor licensed by the government that has lines. The Internets connects LANs, WANs, and other Internets and with the network making up a large variety of communication methods and conventions, the details of protocol are beyond the scope of the text. Protocol is a set of rules and data structures for organizing communication. For example, computers use protocol because it exchanges data. When you’re talking with someone via chat, the computer it exchanging data from one end to another. People in general follow protocol because it follows a structure that is easy to understand and without it, there’s no communication.

            Referring back to PAN, an example of protocol associated with PAN is Bluetooth. Bluetooth is designed for transmitting data over short distances. Bluetooth can now connect to multiple devices such as desktop computers, keyboards, printers, headphones, and even smart cars. For example, when I turn on the Bluetooth option on my IPhone, I have access to listen to music or make phones via my car because it is transmitting data from my phone to the car. My car even syncs up my phone contacts as well as the library of music. Another example would be when printing from a Macbook, you could use Bluetooth to transmit data to print the document. Everything nowadays is becoming Bluetooth enables because it makes it much easier for the data to transfer over.

            The Internet’s profound influence over the world continues to evolve each and every day. From the number of websites to the amount of browser search every second, the Internet has become vast in nature.  The amount of information that exists online is so vast that it’d be impossible to know every single thing because information keep updating, changing, and most of all evolving. Each and every website has an address that identifies a specific number that identifies that the website. All of these websites are controlled by the Internet Corporation for Assigned Names and Numbers (ICANN). Under the ICANN, the amount of websites that exist now is limitless. Take for example the website Youtube, a video streaming service. Youtube, initially starting out in 2005, was relatively small and in the span of just 11 years, it has become the global video-sharing website that everyone uses daily. Another would renowned website is  Facebook, which initially started in 2004 and was meant for college students, but now it’s become a phenomenon for social networking and is one of the most profitable online services. This only comes to show how far technology has come and how the implementation of the Cloud has only furthered the way we access anything on the world wide web. 

BUS 188: Chapter 5 Outline

Matthew Mercado
07/23/16
BUS 188 (11:00am-3:00pm)
Chapter 5 Outline (2 page minimum)
Aggarwal

Chapter 5 Outline

            In our day-to-day lives, we keep track of every single we do. From waking up to lying in bed after a long day, there isn’t a day where our days aren’t eventful and full of tasks and responsibilities. We set an schedule/planner – we keep track of what we have do and check off each one after completion. This is very reminiscent of a database, a track of things that mostly are done on spreadsheets. The spreadsheets are grouped into columns, fields, rows, and finally records. They are recorded on table or file and then sorted out accordingly by specific elements. All of this information compiled makes up a database: Tables or Files, the relationship among rows in tables, and the metadata, data that describes data. For example, a company can maintain a list of all of its employees as well as keep track of their workload, productivity, and efficiency. All of this is to ensure that everything is in order because without a track of things to keep an eye on, there’s no organization.

            Any database is made from a database management system (or abbreviated as DBMS). This program allows people to create, process, and administer databases. The companies and businesses then license DBMS products from vendors from IBM to Microsoft to Oracle. The developers of Databases use DBMS to create tables, relationships, and structures and afterwards, begin to process the database, which requires four processing operations: Red, Insert, Modify, and Deletion. All of the operations require us, the users, to input new database changes whenever need be. Another function to take note of is the administration aspect. Administration requires the setup of many security systems such as accounts, passwords, permissions, and limits for processing the database itself. Much like a computer, there are a lot components that go into the system that require a lot of attention to detail. From its applications to the browsers, computers now have paved way for information to be easily processed. Our SJSU Library Database is a perfect example – it’s open to the students and to the public with the accessibility of acquiring resources pertaining to a large network of information. The Library itself is a structure while its online system could be considered the database for which all the information is based on. 

            However, the database tables alone aren’t sufficient. If it the information presented isn’t accurate, relevant, or even useful to right now, then it isn’t enough to be considered legitimate. This is where a database application comes in – It is a collection of forms, reports, queries, and application programs that serve as an intermediary between users and the data from the database.  The Database administration tasks are split into 4 categories (DBA tasks): Development, Operation, Backup and Recovery, and Adaptation. Each of these 4 has a set of tasks it completed while also having a description that explains their purpose. Developmental tasks include creating and staffing the DBA, form steering committee, specify requirements, validate data models, and evaluate the design of the application. Operational tasks include managing processing rights and responsibilities, manage security, track problems and manage resolutions, monitor the database performances, and managing DBMS. Backup and Recovery’s tasks include monitoring backup procedures, conduct training, and manage recovery. Lastly, Adaptation’s role is to set up a request tracking system and manage configuration changes.

            The applications have 4 elements: Forms, Reports, Queries, and Application Programs. Forms allows user to view data, updating existing data, and delete existing date. Reports are a structured presentation of data using sorting, grouping, filtering, and other operations. Queries allow users to search based on values. Lastly, application programs provided security, data consistency, and with the purpose of special processing. They came into popularity around the 90s and were, at the time, innovative through its technology. Nowadays, the database applications are evolving thanks technology improving each and every year. The database applications that make up the forms, reports, queries, and application programs go through an organizational network that make up the Database Management System (DBMS) and then Tables, relationships, and the metadata.

            Much like a planer/tracker, the list of items/things to complete are neatly organized so that each role serves some sort of purpose. The processes that go into it are integrated and blended together to make up a database. The structure alone is what forms the entire base of operations – the tasks given are a representation of a list of items that are categorized by a specific element to give it detail. Each of these inputs then spread out and given depth in nature. There are entities and relationship that exist to help show how the data/tasks are interconnected and how they entail organization within the database.  

Wednesday, July 20, 2016

BUS 188: Chapter 4 Outline

Matthew Mercado
07/20/16
BUS 188 (11:00am-3:00pm)
Chapter 4 Outline (2 page minimum)
Aggarwal

Chapter 4 Outline

            Technology has revolutionized the way our society works. It has paved way for society to implement changes that are much more befitting to us than before. Take for example our computers, it aids us in a variety of tasks that normally would take much longer if handwritten. Nowadays, computers comes in all shapes and sizes; some that have big monitors such as desktops or even ones that are the size of pocketbooks like tablets. The fact of the matter is, technology has changed the way we complete tasks, research, and socialize. Even now, smart phones are treated like miniature computers that can perform similar tasks a computer can. It’s a powerful piece of technology that will continue to improve because of its hardware. Consisting of electronic components, hardware could be interpreted as the heart of our computers because inputs, processes, outputs, and store data according to the set of instructions encoded within the computer program/hardware. If the hardware is a compilation if components, then the brain would be considered the Central processing unit (or CPU). Much like us, technology has incorporated a “Brain” so it could function with multiple tasks, responsibilities, and instructions. The heart and brain together make up the main memory – a collection of data/memory stored and sometimes could be called Random Access Memory (or RAM). With all these components working in conjunction with one another, technology is only amplifying our experiences.

            There are multiple types of hardware that exist. These would include personal computers, tablets, smartphones, servers, and server farms. Today, Microsoft and Apple are competitors when it comes to what kind of personal computer to have – PC or Mac? For tablet such as Ipads, Microsoft Surfaces, or Kindle Fires, it’s becoming much more convenient to carry around because of its size, durability, and convenience. Just about everyone is social networking on multiple platforms such as Facebook, Instagram, Snap-Chat, or Twitter. All these applications are commonly used on our smartphones regardless if they’re Samsung Galaxies or IPhones. Our handheld devices have truly revolutionized the way we’ve accessed information. Servers are a support mechanism for computers and their users similarly to clients and servers in business. When there is a huge collection of servers, this is known as the server farm. Together, all of these types of hardware help define multiple devices that have only furthered the way we view our world. Technology companies are truly influencing the way electronics have been used and will only continue to improve more because of smart-minded people, innovation, and knowledge.

            Information and Data play a pivotal role in the representation of electronic devices. For instance, our computer’s data represents bits (or binary digits). They serve as switched much like an off-and-on light switch. Another important component are the size of data. Much like a Brain, it can withstand a barrage of information and store it in its memory. Referring back to bits, when chunked together in 8-bits, they are called bytes. The measure of the bytes only continues to grow as there are Kilobytes (KB), Megabytes (MB), Gigabytes (GB), Terabytes (TB), Petabytes (PB), Exabytes (EB), and Zettabytes (ZB). The processing power of computers has only improved and with that amount of memory/storage, there are thousands upon thousands of information that we can research, read, and learn from that computers are easily able to capture.

            The Internet of Things is the idea that objects are becoming connected to the Internet so that they could interact with other devices, applications, or even services. In present day, the way data is transmitted and processed is steadily improving because of the implementation of larger memory banks. This is turn would bring forth the smart device such as our phones because it has more processing power, memory, Internet Access, Wii-fi connectivity, and the ability to connect via other devices. For example, I happen to own 3 devices – An IPhone, tablet, and a Macbook Pro. If I wanted to put music on my IPhone, which then would serve as a MP3 player, I would have to connect my Macbook and IPhone together so that the devices can sync, share data, and transfer information (in this case, music files known as mp3s). Before, you’d have to buy Phones and MP3 players separately because they both serve different purposes. Now, I have a phone that can do multiple things – play music, access an application, and even play a game. To further the idea of smart devices, augmented and virtual reality were made. This takes the real world and then computer-generates a reality. A primary example would be in the field of videogames, people now can play augmented and virtual reality videogames to amplifies the experience of playing games. Before we know it, all these enhancements will become the norm.

            Aside from out computers, phones, and videogames getting an upgrade, a big game changer would be self-driving cars. These cars would have to be programmed to be able to read different situations and avoid any obstacles. However, even with this idea becoming revolutionary, it’s safe to assume that we’re not all going to have self-driving cars because tech giants have to ensure that it’ll provide the means for transportation efficiently without worry of harm. There’ll be multiple people split in the middle on this issue, but if it could further advance our experience, then I don’t personally why it can’t be attained. We’ve come so far from what we have and it’ll only continue to get better from hear on yet. Innovation is the root for all things to be improved upon.   

Sunday, July 17, 2016

BUS 188: Chapter 3 Outline

Matthew Mercado
07/17/16
BUS 188 (11:00am-3:00pm)
Chapter 3 Outline (2 page minimum)
Aggarwal

Chapter 3 Outline

            The overall goals or objectives in any organization are to have some sort of strategy based on their structures, features, and functionality.  The structure alone determines the overall design of the supporting systems. Referring back to Chapter 1, Information systems are defined as: an assembly of hardware, software, data, procedures, and people that help produce information. In determining the organizational strategy of Information systems, it follows a 5-step format: Industry Structure, Competitive Strategy, Value Chains, Business Procedures, and Information Systems. When developing and implementing a strategy, it’s always best to not only know your competitors, but also what organizations can do to have the upper hand. 
           
A model used to analyze and assess an industry’s structure is Porter’s five-forces model. This model helps determine profitability, bargaining powers of the customers, threat of substitutions, bargaining powers of the suppliers, threat of new entrants, and rivalry amongst existing firms. Each of these will help determine the industry as a whole from the money they are profiting from to how well they can sustain that profit. If none of these are taken into consideration, then the outlook on the industry is being overlooked and we aren’t setting ourselves apart from other organizations. In taking these steps, organizations can create and choose a competitive strategy. They can shift their focus, for example, on products or services, or look at from a segmental standpoint. Take for instance Netflix, a video streaming service online. Its competitors such as Hulu and YouTube Red are trying to acquire subscribers by providing the variety of shows so long as they pay their dues monthly/yearly. The primary difference ranges from variety of shows provided, the quality of the videos themselves, the price of the plan, and the overall entertainment value. This is where companies try to retain their customers while also looking into how to sustain their profits, thus they have to find the competitive advantage over their competitors.

            Organizations that begin to develop, plan, and implement their strategies have to think of the overall structure of their business. An organization could potentially lean toward a differentiation strategy, although this could prove to be costly than effective. When looking at their business activities, they look the overall value chain – network value-creating activities. The chain is divided into primary and support activities. Some examples of primary activities are: Inbound logistics, operations/manufacturing, outbound logistics, sales and marketing, and customer service. For support activities, they contribute directly to production, sale, and service of the product. For both activities, they both serve a purpose.

            Much like Value Chains, a business process is a network of activities that generate value by transforming inputs into outputs. The overall business process cost inputs the cost of the activities and the margin of the business process is the value of those outputs deducting the cost. The activities can be performed by a human, computer system, or perhaps a little of both. Each activity plays a role and serve a overall purpose so long as it is achieves its desired result. The business processes vary when it comes to costs and effectiveness; just because you achieve a desired result doesn’t mean that there could be a price to pay or its 100% effective.
It’s important how organizations utilize their information systems so they can have a competitive advantage. For example, an organization could have competitive advantage over products and services. An organization’s products and services could be considered fairly new, enhanced/advanced, and differentiated from others. To implement thus, they would have to retain customers and buyers, retain their suppliers, raise barriers to market entry, establish alliances/friendships, and most importantly, reduce the costs of that product/service.

            Information systems are beneficial when it comes to creating competitive advantage. Referring back to the Netflix example, that product/service has been able to retain its customers, establish alliances w/TV and movie networks, and most importantly have kept the costs to a minimum. That’s why so many have subscribed to that service based on those three factors and to this day, is still continuing to grow. Netflix has even ventured forth into developing its own shows that are exclusive to its streaming services, yet another reason to differentiate itself from its customers. However, the Hulu streaming services have started developing their own originals and thus have become a competitor. The biggest differentiation between Hulu and Netflix is that Hulu still has ads despite the low price to watch the shows whereas with Netflix, no ads. Another example of competitive advantage could be over business processes. Organizations have to be able to retain its customers by making it as difficult as possible to switch to another product. This is commonly referred to as switching costs because when locking in their suppliers, they’re making it harder for customers to switch to another organization. They could potentially make it harder for new expensive products from coming into the market and thus retaining its customers.

            Strategies are important to any sort of organization. It keeps tabs on the entirety of the organization and sees what needs to be improved while also issuing what needs to be fixed. The inputs have to balance out the outputs and the whole point of it is to sustain customers and make a profit. In doing so, implementing the best strategy would ensure that an organization has a competitive advantage over its competitors. This only comes to show how Information Systems plays an important role in decision-making.